of performance in decoding icons on computer screens. The study consisted of two parts. Part A identified the test group's icons of preference for 24 task descriptions. Four icons, each designed by a different software manufacturer, were collected for each... to a different group of subjects to determine understandability. Subjects with different computer backgrounds were tested individually using a Macintosh?. Their performance in matching an icon to a task description correctly and the time taken...

Presented in Part A with Worst Icons the Percent Ranking for Best and 50 A TEXT DOCUMENT WASTEBIN A BUFFER STORAGE AREA READY FOR DISPOSAL PRINTER AN OBJECT GENERATING A PRINTED REPRESENTATION OF AN OBJECT ISO FOLDER ALSO DIRECTORY, CONTAINS... the most preferred set, and 4 were among the least preferred set. Icons ranking third and second are not shown. TABLE 2 Total Icons by Manufacturer Used in Survey and Number Selected as Most Preferred and Least Preferred NEXT %C MR. HIKAWA C&l ISO...

. #12;Project Focus Art&Science of Depiction Software Engineering Byzantine Icons Software #12;Where of iconography is that the 'art' of writing icons is at its core a spiritual discipline." (Olga Milenback

This thesis describes a system for scripting and editing graphic procedures with graphic representations or "icons." The icons are small bitmap images that carry with them information about spatial placement, list placement, ...

ourselves what cultural forces contribute to the iconizing of certain architectural monuments in the world's subconscious. Are these icons valid? And most importantly, is it something we, as a society, should remedy in order to prevent other acts...

to write an icon. #12;2 Project Focus Art&Science of Depiction Software Engineering Byzantine Icons Software Where to Start Â· History Â· Technique Â· Analysis #12;3 History Â· Byzantium is the name given of the techniques of iconography is that the 'art' of writing icons is at its core a spiritual discipline." (Olga

1 An iconic approach to representing climate change Saffron Jessica O'Neill A thesis submitted-experts to be meaningfully engaged with the issue of climate change. This thesis investigates the value of engaging non-experts with climate change at the individual level. Research demonstrates that individuals perceive climate change

representation, and intensifies iconicity. Or, to put it in semiotic terms, the symbolic and the indexical dimensions contribute to the process of iconization, inhibiting new affective configurations. The repetition of historically- 15 marked social...1 Private Narratives and Infant Views: Iconizing 1970s Militancy in Contemporary Argentine Cinema Shot in 2011 and released in September 2012, Infancia clandestina, by Argentine director Benjamín Ávila, has already been sold to over twenty...

To propose a new conceptualization of "home", it is necessary to explore the mechanisms that have created this revered icon. Since the industrial revolution, the commercial packaging of the home has continually reinforced ...

, in driving around a bend, subjects fixate the tangent point of the curve to control steering angle position? This paper proposes a such a model that accomplishes this calculation. The model uses iconic eye movements. A central feature of the model is that it separates the targeting process, which

the temperate phage infects Escherichia coli, it enters one of two pathways: lytic (replicates and killsThe marine biodiversity curve is an icon of paleobiology. The familiar curve shows increasing (distinct rock units) as a proxy for the amount of marine rock available for paleontological sampling

What sort of image does the planet Earth possess at the opening of the 21st century? If in the 1960s, the Whole Earth, the planet as seen from space, became a cold war, proto-environmentalist icon for a fragile ocean planet, ...

, and to an ‘archaic’ pre-1990s format. By focusing on a political thriller that I find paradigmatic of this recent trend, Gastón Biraben’s Cautiva/Captive (2005), I argue that these films (which I call ‘iconic fictions’) should not be read as additional examples...

Keywords: iconic database, position-independent, spatial indexing 1. INTRODUCTION Maps provide a means of maintaining a database of car- tographic information. Although maps are usually thought of as capturing, and rivers, roads, and buildings. A collection of digitized map images is an example of an image database

Feb 8, 2014 ... geometry steps of the trust-funnel method presented by Gould and Toint [13] for the ... ?Namur Center for Complex Systems (naXys) and Department of .... A third possibility stems from the fact that we want to build models for ...

is analysed as a set-valued impulsive unbounded control law. ...... variety of articles devoted to the analysis of the impact phase in the optimal .... In the case where the complementarity system arises from mechanical systems without Coulomb.

The number of PDF files with embedded malicious code has risen significantly in the past few years. This is due to the portability of the file format, the ways Adobe Reader recovers from corrupt PDF files, the addition of many multimedia and scripting extensions to the file format, and many format properties the malware author may use to disguise the presence of malware. Current research focuses on executable, MS Office, and HTML formats. In this paper, several features and properties of PDF Files are identified. Features are extracted using an instrumented open source PDF viewer. The feature descriptions of benign and malicious PDFs can be used to construct a machine learning model for detecting possible malware in future PDF files. The detection rate of PDF malware by current antivirus software is very low. A PDF file is easy to edit and manipulate because it is a text format, providing a low barrier to malware authors. Analyzing PDF files for malware is nonetheless difficult because of (a) the complexity of the formatting language, (b) the parsing idiosyncrasies in Adobe Reader, and (c) undocumented correction techniques employed in Adobe Reader. In May 2011, Esparza demonstrated that PDF malware could be hidden from 42 of 43 antivirus packages by combining multiple obfuscation techniques [4]. One reason current antivirus software fails is the ease of varying byte sequences in PDF malware, thereby rendering conventional signature-based virus detection useless. The compression and encryption functions produce sequences of bytes that are each functions of multiple input bytes. As a result, padding the malware payload with some whitespace before compression/encryption can change many of the bytes in the final payload. In this study we analyzed a corpus of 2591 benign and 87 malicious PDF files. While this corpus is admittedly small, it allowed us to test a system for collecting indicators of embedded PDF malware. We will call these indicators features throughout the rest of this report. The features are extracted using an instrumented PDF viewer, and are the inputs to a prediction model that scores the likelihood of a PDF file containing malware. The prediction model is constructed from a sample of labeled data by a machine learning algorithm (specifically, decision tree ensemble learning). Preliminary experiments show that the model is able to detect half of the PDF malware in the corpus with zero false alarms. We conclude the report with suggestions for extending this work to detect a greater variety of PDF malware.

The joint velocity-scalar-frequency probability density function (PDF) methodology is employed for prediction of a bluff-body stabilized lean premixed methane-air flame. A reduced mechanism with CO and NO chemistry is used to describe fuel oxidation. The predicted mean and rms values of the velocity, temperature and concentrations of major and minor species are compared with laboratory measurements. This technical effort was performed in support of the National Energy Technology Laboratory’s on-going research in “Assessment of Turbo-Chemistry Models for Gas Turbine Combustion Emissions” under the RDS contract DE-AC26-04NT41817.